Search for dissertations about: "data security"
Showing result 1 - 5 of 615 swedish dissertations containing the words data security.
-
1. Web Application Content Security
Abstract : The web has become ubiquitous in modern lives. People go online to stay in contact with their friends or to manage their bank account. With lots of different sensitive information handled by web applications securing them naturally becomes important. READ MORE
-
2. Visualising Security through Computer Games : Investigating Game-Based Instruction in ICT Security:an Experimental Approach
Abstract : This thesis investigates whether learning materials in the form of computer games can increase knowledge and comprehension in the area of ICT security.Through a series of experiments carried out in Sweden between the years 2000 and 2003, investigating theoretical knowledge as well as practical knowledge gained through a single-user computer game, data were collected and subjected to quantitative and qualitative analyses. READ MORE
-
3. Some Problems in Quantified Security
Abstract : This thesis contains work related to quantitative representation and analysis of computer and information security. The ability to accurately describe security using quantitative methods could offer better control and evaluation of security in operational settings. READ MORE
-
4. Secure and Privacy-aware Data Collection and Processing in Mobile Health Systems
Abstract : Healthcare systems have assimilated information and communication technologies in order to improve the quality of healthcare and patient's experience at reduced costs. The increasing digitalization of people's health information raises however new threats regarding information security and privacy. READ MORE
-
5. Modeling and Tuning Security from a Quality of Service Perspective
Abstract : Security has traditionally been thought of as a system or network attribute that was the result of the joint endeavors of the designer, maintainer and user, among others. Even though security can never reach a level of 100%, the aim has been to provide as much security as possible, given the boundary conditions in question. With the advent of, e.g. READ MORE